Knox Arkeia server 4.2, and possibly other versions, uses a constant salt when encrypting passwords using the crypt() function, which makes it easier for an attacker to conduct brute force password guessing.
2001-08-31T04:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | arkeia | arkeia | 4.2 | Yes |
Application | arkeia | arkeia | 4.2.8-2 | Yes |